"In certain circumstances, after the use of certain Intel x86-64 architecture instructions, a debug exception pointing to data in a lower ring (for most operating systems, the kernel Ring 0 level) is made available to operating system components running in Ring 3," vulnerability analyst at the Software Engineering Institute – Carnegie Mellon University Garret Wassermann explained.

According to Wasserman, this could allow an attacker to utilise operating system APIs to gain access to sensitive memory information or control low-level operating system functions.

"Several operating systems appear to incorrectly handle this exception due to interpretation of potentially unclear existing documentation and guidance on the use of these instructions," Wassermann said.

As a result, an attacker could read sensitive data in memory or control low-level operating system functions.

Slideshows

Google and Microsoft tackle triple value play at Synnex Alliance 2018

This Synnex Alliance roadshow, in association with Google and Microsoft, started with the end-user and worked back to define the notion of value, outlining the lucrative partner opportunities ahead in 2018.

Changing names: the top company rebrands hitting the channel

The past year has seen a flurry of acquisitions, sales, consolidations and business transformations in the local tech sector; ARN takes a look at the company name changes and rebrands across the Australian channel that have resulted from all this activity.

Upcoming tech talent share insights at Emerging Leaders 2018

The channel came together for the third running of the ARN Emerging Leaders Forum in Australia, created to provide a program that identifies, educates and showcases the upcoming talent of the ICT industry.

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.